DNS Security

Cato’s DNS Security inspects all DNS traffic, preventing malicious DNS activity hiding within the protocol’s traffic, and blocking DNS requests to malicious destinations before a connection is made.

DNS Protection Configuration DNS Protection Configuration DNS Protection Configuration DNS Protection Configuration DNS Protection Configuration Events Page - DNS Protection Event

DNS Security Capabilities

AI-based DNS Inspection Deliver Superior In-line Phishing Protection

Phishing is one of the top attack vectors that every CISO is concerned about.

Ongoing training of AI and ML algorithms on Cato’s massive global data lake enables Cato DNS Security to provide in-line identification of domain squatting and other website impersonation attempts. This is achieved through real-time analysis of webpage components, domain age, popularity, and patterns associated with toolkits used in phishing sites. This Inline detection of phishing attacks helps prevent credential harvesting, malware delivery, and sensitive data loss.

DNS Protection Configuration

Block Malicious Domains and C&C Sites Before Connection

The number of malicious sites that host command and control (C&C) servers to remotely manage malware is huge. Attackers continuously move their C&C servers between sites to avoid detection and blacklisting. Cato DNS Security uses Cato’s timely and continuously optimized threat intelligence system to identify malicious domains and C&C sites and block traffic to and from them in real time. Using Cato DNS Security, enterprises dramatically reduce exposure to millions of web-based attacks with near-zero false positives.

DNS Protection Configuration

Stop Data Loss and Malicious Activity over DNS Tunneling

DNS tunneling attacks leverages the need to allow DNS traffic to pass through security controls, as a method for data exfiltration and C&C access. Cato’s DNS Security analyzes DNS request properties such as packet size, record type, and the ratio of unique subdomains to identify anomalies and indicators of DNS tunneling attacks. Cato’s AI/ML algorithms are continuously trained to identify DNS Tunneling, enabling protection that is not dependent on specific knowledge of the threat actor or domain name.

DNS Protection Configuration Events Page - DNS Protection Event

Prevent Resource Leaching from Crypto Miners

Crypto miners use compromised corporate endpoints for financial gain leading to system instability, poor user experience, and increased costs for the organization. Cato leverages dedicated rules and heuristics to identify domains that are used for crypto-mining operations, blocking any DNS requests to these destinations. With Cato, enterprises protect users’ productivity and security from impact by unauthorized use.

DNS Protection Configuration DNS Protection Configuration

Full Visibility into DNS Security Threats and Events

All threat activity is logged in Cato’s global data lake, providing administrators with instant access to the threat information they need via a single console. DNS security events are visible in the security threats dashboard with filtering and drill down capability into all events related to DNS protection. Security teams can quickly understand and evaluate DNS threats to their organization without aggregating multiple data sources or navigating between multiple consoles.

Events Page - DNS Protection Event

DNS Protection Video Demo

Cato’s DNS protection provides an additional layer of protection by blocking DNS requests to malicious and phishing sites, blocking domains registered within the last 14 days and blocking DNS tunneling and crypto-mining activity.

真のSASEプラットフォームの戦略的メリット

真にクラウドネイティブなSASEプラットフォームとして、ゼロからアーキテクチャの構築が行われたCatoのセキュリティ機能はすべて、現在も将来においても、Catoプラットフォームの特徴であるグローバルな分散化、抜群のスケーラビリティ、高度なレジリエンシー、自律的なライフサイクル管理、そして一貫性のある管理モデルを活用します。

 

一貫性のある
ポリシー適用

Catoは、すべてのセキュリティ機能をグローバルに拡張し、非常に大規模なデータセンターからユーザーの各デバイスまで、すべての場所と人を対象に一貫性のあるポリシー適用を実現します。

 

スケーラブルでレジリエントな保護機能

Catoは、TLS通信の完全な復号化が可能で、スケーリングにより、すべてのセキュリティ機能においてマルチギガのトラフィックストリームを検査できます。また、サービスコンポーネントの不具合から自動的に回復し、継続的なセキュリティ保護を実現できます。

 

自律的なライフサイクル管理

Catoは、すべてのユーザーと拠点を対象に、お客様の関与なしでSASEクラウドプラットフォームが最適なセキュリティポスチャを維持し、99.999%のサービス稼働率と低遅延のセキュリティ処理を実現できるよう万全を期しています。

 

管理を一元化

Catoなら、構成、アナリティクス、トラブルシューティング、インシデント検知・対応など、セキュリティとネットワークに関するすべての機能を一元的に、一貫性のある形で管理できます。統一的な管理モデルにより、ITチームおよび業務において簡単に新機能を導入できます。

 

「Catoで侵害攻撃シミュレーション(BAS)を実行したところ、検知率が急上昇し、感染率とラテラルムーブメントはシンプルに低下しました。これこそが、Catoのセキュリティを信頼する決め手となった要因です。」

Catoを試してみる

ITチームが待ち望んでいたソリューションです。

きっと驚かれることでしょう。